SQLMAP帮助翻译

SQLMAP命令总结

Options:

  -h, --help            Show basic help message and exit    显示基本的帮助信息并退出

  -hh                   Show advanced help message and exit      显示高级帮助消息并退出

  --version             Show program's version number and exit   显示程序的版本号和退出

  -v VERBOSE            Verbosity level: 0-6 (default 1)

 

  Target:

    At least one of these options has to be provided to define the

    target(s)

 

-d DIRECT           Connection string for direct database connection

用于直接数据库连接的连接字符串

    -u URL, --url=URL   Target URL (e.g. "http://www.site.com/vuln.php?id=1")

-l LOGFILE          Parse target(s) from Burp or WebScarab proxy log file

从Burp或WebScarab代理日志文件中解析目标

    -x SITEMAPURL       Parse target(s) from remote sitemap(.xml) file

    -m BULKFILE         Scan multiple targets given in a textual file

    -r REQUESTFILE      Load HTTP request from a file

    -g GOOGLEDORK       Process Google dork results as target URLs

    -c CONFIGFILE       Load options from a configuration INI file从配置INI文件中加载选项

 

  Request:

    These options can be used to specify how to connect to the target URL

这些选项可用于指定如何连接到目标URL

--method=METHOD     Force usage of given HTTP method (e.g. PUT)

强制使用给定的HTTP方法

    --data=DATA         Data string to be sent through POST

    --param-del=PARA..  Character used for splitting parameter values   用于分割参数值的字符

    --cookie=COOKIE     HTTP Cookie header value

    --cookie-del=COO..  Character used for splitting cookie values

--load-cookies=L..  File containing cookies in Netscape/wget format

包含Netscape/wget格式的cookie的文件

--drop-set-cookie   Ignore Set-Cookie header from response

忽略响应中的Set-Cookie

    --user-agent=AGENT  HTTP User-Agent header value   HTTP用户代理头值

--random-agent      Use randomly selected HTTP User-Agent header value

使用随机选择的HTTP用户代理头值

    --host=HOST         HTTP Host header value

    --referer=REFERER   HTTP Referer header value

    -H HEADER, --hea..  Extra header (e.g. "X-Forwarded-For: 127.0.0.1")

    --headers=HEADERS   Extra headers (e.g. "Accept-Language: fr\nETag: 123")

    --auth-type=AUTH..  HTTP authentication身份验证 type (Basic, Digest, NTLM or PKI)

    --auth-cred=AUTH..  HTTP authentication credentials (name:password)

    --auth-file=AUTH..  HTTP authentication PEM cert/private key file

    --ignore-code=IG..  Ignore HTTP error code (e.g. 401)

    --ignore-proxy      Ignore system default proxy settings

    --ignore-redirects  Ignore redirection attempts忽略重定向的尝试

    --ignore-timeouts   Ignore connection timeouts忽略连接超时

    --proxy=PROXY       Use a proxy to connect to the target URL

    --proxy-cred=PRO..  Proxy authentication credentials (name:password)

    --proxy-file=PRO..  Load proxy list from a file

    --tor               Use Tor anonymity network

    --tor-port=TORPORT  Set Tor proxy port other than default

    --tor-type=TORTYPE  Set Tor proxy type (HTTP, SOCKS4 or SOCKS5 (default))

    --check-tor         Check to see if Tor is used properly检查Tor是否使用正确

--delay=DELAY       Delay in seconds between each HTTP request

每个HTTP请求之间的延迟(以秒为单位)

    --timeout=TIMEOUT   Seconds to wait before timeout connection (default 30)

--retries=RETRIES   Retries when the connection timeouts (default 3)

当连接超时时重试(默认3)

--randomize=RPARAM  Randomly change value for given parameter(s)

给定参数(s)随机改变值

    --safe-url=SAFEURL  URL address to visit frequently during testing

    --safe-post=SAFE..  POST data to send to a safe URL

    --safe-req=SAFER..  Load safe HTTP request from a file

    --safe-freq=SAFE..  Test requests between two visits to a given safe URL

    --skip-urlencode    Skip URL encoding of payload data跳过有效负载数据的URL编码

    --csrf-token=CSR..  Parameter 参数used to hold anti-CSRF token

    --csrf-url=CSRFURL  URL address to visit to extract anti-CSRF token

    --force-ssl         Force usage of SSL/HTTPS

    --hpp               Use HTTP parameter pollution method

    --eval=EVALCODE     Evaluate provided Python code before the request (e.g.

                        "import hashlib;id2=hashlib.md5(id).hexdigest()")

在请求之前评估提供的Python代码(例如。“进口hashlib;id2 = hashlib.md5(id).hexdigest())

  Optimization:

    These options can be used to optimize the performance of sqlmap

 

    -o                  Turn on all optimization switches打开所有优化开关

    --predict-output    Predict common queries output预测常见查询输出

    --keep-alive        Use persistent HTTP(s) connections使用持久HTTP(s)连接

--null-connection   Retrieve page length without actual HTTP response body

检索页面长度,没有实际的HTTP响应主体

    --threads=THREADS   Max number of concurrent HTTP(s) requests (default 1)

并发HTTP(s)请求的最大数量(默认1)

  Injection:

    These options can be used to specify which parameters to test for,

    provide custom injection payloads and optional tampering scripts

这些选项可用于指定要测试的参数,

提供自定义注入有效载荷和可选篡改脚本

 

    -p TESTPARAMETER    Testable parameter(s)的Testable一个参数

    --skip=SKIP         Skip testing for given parameter(s)跳过对给定参数的测试

--skip-static       Skip testing parameters that not appear to be dynamic

跳过看起来不是动态的测试参数

--param-exclude=..  Regexp to exclude parameters from testing (e.g. "ses")

Regexp以排除测试中的参数

    --dbms=DBMS         Force back-end DBMS to this value强制后端DBMS到这个值

    --dbms-cred=DBMS..  DBMS authentication credentials (user:password)DBMS身份验证凭证

--os=OS             Force back-end DBMS operating system to this value

强迫后端DBMS操作系统达到这个值

    --invalid-bignum    Use big numbers for invalidating values

    --invalid-logical   Use logical operations for invalidating values

    --invalid-string    Use random strings for invalidating values

    --no-cast           Turn off payload casting mechanism

    --no-escape         Turn off string escaping mechanism

    --prefix=PREFIX     Injection payload prefix string注入有效载荷前缀字符串

    --suffix=SUFFIX     Injection payload suffix后缀 string

    --tamper=TAMPER     Use given script(s) for tampering injection data

使用给定的脚本篡改注入数据

  Detection:

    These options can be used to customize the detection phase

这些选项可用于自定义检测阶段

    --level=LEVEL       Level of tests to perform (1-5, default 1)

    --risk=RISK         Risk of tests to perform (1-3, default 1)

    --string=STRING     String to match when query is evaluated to True

    --not-string=NOT..  String to match when query is evaluated to False

    --regexp=REGEXP     Regexp to match when query is evaluated to True

--code=CODE         HTTP code to match when query is evaluated to True

当查询被计算为True时匹配的HTTP代码

    --text-only         Compare pages based only on the textual content

    --titles            Compare pages based only on their titles

 

  Techniques:

    These options can be used to tweak testing of specific SQL injection

    techniques

这些选项可用于调整特定SQL注入的测试

--technique=TECH    SQL injection techniques to use (default "BEUSTQ")

使用SQL注入技术

--time-sec=TIMESEC  Seconds to delay the DBMS response (default 5)

延迟DBMS响应的时间

--union-cols=UCOLS  Range of columns to test for UNION query SQL injection

                            要测试联合查询SQL注入的列的范围

 

    --union-char=UCHAR  Character to use for bruteforcing number of columns

用于bruteforce列数的字符

--union-from=UFROM  Table to use in FROM part of UNION query SQL injection

表中使用的部分来自联合查询SQL注入

--dns-domain=DNS..  Domain name used for DNS exfiltration attack

域名用于DNS过滤攻击

    --second-order=S..  Resulting page URL searched for second-order response

结果页面URL搜索二级响应

  Fingerprint:

    -f, --fingerprint   Perform an extensive DBMS version fingerprint

执行一个广泛的DBMS版本指纹

  Enumeration:

    These options can be used to enumerate the back-end database

    management system information, structure and data contained in the

    tables. Moreover you can run your own SQL statements

这些选项可用于枚举后端数据库管理系统中包含的信息、结构和数据表。此外,还可以运行自己的SQL语句

    -a, --all           Retrieve everything检索所有

    -b, --banner        Retrieve DBMS banner检索DBMS横幅

    --current-user      Retrieve DBMS current user

    --current-db        Retrieve DBMS current database

    --hostname          Retrieve DBMS server hostname

    --is-dba            检测Detect if the DBMS current user is DBA

    --users             Enumerate DBMS users列举DBMS用户

    --passwords         Enumerate DBMS users password hashes

    --privileges        Enumerate DBMS users privileges

    --roles             Enumerate DBMS users roles

    --dbs               Enumerate DBMS databases

    --tables            Enumerate DBMS database tables

    --columns           Enumerate DBMS database table columns

    --schema            Enumerate DBMS schema

    --count             Retrieve number of entries for table(s)

    --dump              Dump DBMS database table entries转储DBMS数据库表项

    --dump-all          Dump all DBMS databases tables entries转储所有DBMS数据库表项

    --search            Search column(s), table(s) and/or database name(s)

    --comments          Retrieve DBMS comments

    -D DB               DBMS database to enumerate

    -T TBL              DBMS database table(s) to enumerate DBMS数据库表去列举

    -C COL              DBMS database table column(s) to enumerate

    -X EXCLUDECOL       DBMS database table column(s) to not enumerate

    -U USER             DBMS user to enumerate

--exclude-sysdbs    Exclude DBMS system databases when enumerating tables

在列举表时排除DBMS系统数据库

    --pivot-column=P..  Pivot column name主列名称

--where=DUMPWHERE   Use WHERE condition while table dumping

在表转储时使用WHERE条件

    --start=LIMITSTART  First dump table entry条目 to retrieve

    --stop=LIMITSTOP    Last dump转储 table entry to retrieve 检索

    --first=FIRSTCHAR   First query output word character to retrieve

    --last=LASTCHAR     Last query output word character to retrieve

    --sql-query=QUERY   SQL statement to be executed执行

    --sql-shell         Prompt for an interactive SQL shell提示输入交互式SQL shell

    --sql-file=SQLFILE  Execute SQL statements 语句from given file(s)

 

  Brute force:

    These options can be used to run brute force checks

这些选项可用于执行强力检查

    --common-tables     Check existence存在 of common tables

    --common-columns    Check existence of common columns

 

  User-defined function injection注入:

    These options can be used to create custom user-defined functions

这些选项可用于创建自定义用户定义函数

    --udf-inject        Inject custom user-defined functions注入自定义用户定义函数

    --shared-lib=SHLIB  Local path of the shared library共享库的本地路径

 

  File system access:

    These options can be used to access the back-end database management

    system underlying file system这些选项可用于访问后端数据库管理

系统底层文件系统

 

    --file-read=RFILE   Read a file from the back-end DBMS file system

    --file-write=WFILE  Write a local file on the back-end DBMS file system

    --file-dest=DFILE   Back-end DBMS absolute filepath to write to

后端数据库管理系统绝对文件路径写入

  Operating system access:

    These options can be used to access the back-end database management

    system underlying operating system

 

    --os-cmd=OSCMD      Execute an operating system command执行操作系统命令

--os-shell          Prompt for an interactive operating system shell

--os-pwn            Prompt for an OOB shell, Meterpreter or VNC

提示输入OOB shell、Meterpreter或VNC

    --os-smbrelay       One click 一次点击prompt for an OOB shell, Meterpreter or VNC

    --os-bof            Stored procedure buffer overflow exploitation

    --priv-esc          Database process user privilege escalation数据库进程用户权限升级

--msf-path=MSFPATH  Local path where Metasploit Framework is installed

安装Metasploit框架的本地路径

 

--tmp-path=TMPPATH  Remote absolute path of temporary files directory

远程绝对路径的临时文件目录

 

  Windows registry access:

    These options can be used to access the back-end database management

    system Windows registry这些选项可用于访问后端数据库管理

系统Windows注册表

 

    --reg-read          Read a Windows registry 注册表key value

    --reg-add           Write a Windows registry key value data

    --reg-del           Delete a Windows registry key value

    --reg-key=REGKEY    Windows registry key

    --reg-value=REGVAL  Windows registry key value

    --reg-data=REGDATA  Windows registry key value data

    --reg-type=REGTYPE  Windows registry key value type

 

  General:

    These options can be used to set some general working parameters

这些选项可以用来设置一些一般的工作参数

-s SESSIONFILE      Load session from a stored (.sqlite) fil从存储的(.sqlite)文件加载会话

-t TRAFFICFILE      Log all HTTP traffic into a textual file将所有HTTP通信记录到文本文件中

    --batch             Never ask for user input, use the default behavior

    --binary-fields=..  Result fields having binary values 具有二进制值的结果字段(e.g. "digest")

    --check-internet    Check Internet connection before assessing the target

    --crawl=CRAWLDEPTH  Crawl the website starting from the target URL从目标URL开始抓取网站

    --crawl-exclude=..  Regexp正则表达式 to exclude pages from crawling (e.g. "logout")

    --csv-del=CSVDEL    Delimiting character used in CSV output 在CSV输出中使用的分隔字符(default ",")

    --charset=CHARSET   Blind SQL injection charset (e.g. "0123456789abcdef")

    --dump-format=DU..  Format of dumped data (CSV (default), HTML or SQLITE)

    --encoding=ENCOD..  Character encoding used for data retrieval 数据检索(e.g. GBK)

--eta               Display for each output the estimated time of arrival

显示每个输出的预计到达时间

    --flush-session     Flush session files for current target刷新当前目标的会话文件

    --forms             Parse and test forms on target URL解析和测试目标URL上的表单

    --fresh-queries     Ignore query results stored in session file忽略存储在会话文件中的查询结果

    --har=HARFILE       Log all HTTP traffic into a HAR file

    --hex               Use DBMS hex function(s) for data retrieval

    --output-dir=OUT..  Custom output directory path自定义输出目录路径

    --parse-errors      Parse解析 and display DBMS error messages from responses反应

    --save=SAVECONFIG   Save options to a configuration INI file将选项保存到配置INI文件中

    --scope=SCOPE       Regexp to filter targets from provided proxy log

    --test-filter=TE..  Select tests by payloads and/or titles根据有效负载和/或标题选择测试 (e.g. ROW)

    --test-skip=TEST..  Skip tests by payloads and/or titles (e.g. BENCHMARK)

    --update            Update sqlmap

 

  Miscellaneous: 杂项:

    -z MNEMONICS        Use short mnemonics助记符 (e.g. "flu,bat,ban,tec=EU")

--alert=ALERT                 Run host OS command(s) when SQL injection is found

在发现SQL注入时运行主机OS命令

    --answers=ANSWERS   Set question answers问题答案 (e.g. "quit=N,follow=N")

    --beep                     Beep on question and/or when SQL injection is found

    --cleanup                   Clean up the DBMS from sqlmap specific UDF and tables

    --dependencies 依赖关系     Check for missing (non-core) sqlmap dependencies

    --disable-coloring     Disable console output coloring禁用控制台输出着色

    --gpage=GOOGLEPAGE  Use Google dork results from specified page number

--identify-waf      Make a thorough testing for a WAF/IPS/IDS protection

对WAF/IPS/IDS保护进行彻底的测试

--mobile            Imitate smartphone through HTTP User-Agent header

模仿智能手机通过HTTP用户代理头

    --offline           Work in offline mode脱机工作 (only use session data)

--purge-output      Safely remove all content from output directory

安全地从输出目录中删除所有内容

    --skip-waf          Skip heuristic detection跳过启发式检测 of WAF/IPS/IDS protection

    --smart             Conduct thorough tests only if positive heuristic(s)

    --sqlmap-shell      Prompt for an interactive sqlmap shell提示输入交互式sqlmap shell

--tmp-dir=TMPDIR    Local directory for storing temporary files

用于存储临时文件的本地目录

    --web-root=WEBROOT  Web server document root directory (e.g. "/var/www")

--wizard 向导           Simple wizard interface for beginner users

简单的向导界面,初学者用户

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

战神/calmness

你的鼓励是我最大的动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值